[PDF][PDF] Generalizing data to provide anonymity when disclosing information

P Samarati, L Sweeney - PODS, 1998 - eng.auburn.edu
The proliferation of information on the Internet and access to fast computers with large
storage capacities has increased the volume of information collected and disseminated …

Flexible support for multiple access control policies

S Jajodia, P Samarati, ML Sapino… - ACM Transactions on …, 2001 - dl.acm.org
Although several access control policies can be devised for controlling access to
information, all existing authorization models, and the corresponding enforcement …

Securing context-aware applications using environment roles

MJ Covington, W Long, S Srinivasan, AK Dev… - Proceedings of the sixth …, 2001 - dl.acm.org
In the future, a largely invisible and ubiquitous computing infrastructure will assist people
with a variety of activities in the home and at work. The applications that will be deployed in …

Rights protection for relational data

R Sion, M Atallah, S Prabhakar - Proceedings of the 2003 ACM SIGMOD …, 2003 - dl.acm.org
Protecting rights over relational data is of ever increasing interest, especially considering
areas where sensitive, valuable content is to be outsourced. A good example is a data …

A fine-grained access control system for XML documents

E Damiani, S De Capitani di Vimercati… - ACM Transactions on …, 2002 - dl.acm.org
Web-based applications greatly increase information availability and ease of access, which
is optimal for public information. The distribution and sharing of information via the Web that …

Delegation logic: A logic-based approach to distributed authorization

N Li, BN Grosof, J Feigenbaum - ACM Transactions on Information and …, 2003 - dl.acm.org
We address the problem of authorization in large-scale, open, distributed systems.
Authorization decisions are needed in electronic commerce, mobile-code execution, remote …

A logical language for expressing authorizations

S Jajodia, P Samarati… - Proceedings. 1997 IEEE …, 1997 - ieeexplore.ieee.org
A major drawback of existing access control systems is that they have all been developed
with a specific access control policy in mind. This means that all protection requirements (ie …

Generalized role-based access control

MJ Moyer, M Abamad - Proceedings 21st International …, 2001 - ieeexplore.ieee.org
Generalized Role-Based Access Control (GRBAC) is a new paradigm for creating and
maintaining rich access control policies. GRBAC leverages and extends the power of …

A logical framework for reasoning about access control models

E Bertino, B Catania, E Ferrari, P Perlasca - ACM Transactions on …, 2003 - dl.acm.org
The increased awareness of the importance of data protection has made access control a
relevant component of current data management systems. Moreover, emerging applications …

An access control model supporting periodicity constraints and temporal reasoning

E Bertino, C Bettini, E Ferrari, P Samarati - ACM Transactions on …, 1998 - dl.acm.org
Access control models, such as the ones supported by commercial DBMSs, are not yet able
to fully meet many application needs. An important requirement derives from the temporal …